Determinants of R&D Outsourcing at Japanese Firms: Transaction Cost and Strategic Management Perspectives

This paper examines the factors, which determine R&D outsourcing behaviour at Japanese firms, from the viewpoints of transaction cost and strategic management, since the latter half of the 1990s. This study uses empirical analysis, which involves the application of large-sample data. The principal findings of this paper are listed below. Firms that belong to a wider corporate group are more active in executing R&D outsourcing activities. Diversification strategies such as the expansion of product and sales markets have a positive effect on the R&D outsourcing behaviour of firms. Moreover, while quantitative R&D resources have positive influences on R&D outsourcing, qualitative indices have no effect. These facts suggest that R&D outsourcing behaviour of Japanese firms are consistent with the two perspectives of transaction cost and strategic management. Specifically, a conventional corporate group network plays an important role in R&D outsourcing behaviour. Firms that execute R&D outsourcing leverage 'old' networks to construct 'new' networks and use both networks properly.

A Generic, Functionally Comprehensive Approach to Maintaining an Ontology as a Relational Database

An ontology is a data model that represents a set of concepts in a given field and the relationships among those concepts. As the emphasis on achieving a semantic web continues to escalate, ontologies for all types of domains increasingly will be developed. These ontologies may become large and complex, and as their size and complexity grows, so will the need for multi-user interfaces for ontology curation. Herein a functionally comprehensive, generic approach to maintaining an ontology as a relational database is presented. Unlike many other ontology editors that utilize a database, this approach is entirely domain-generic and fully supports Webbased, collaborative editing including the designation of different levels of authorization for users.

Shadow Imaging Study of Z-Pinch Dynamic Hohlraum

In order to obtaining the dynamic evolution image of Tungsten array for foam padding, and to research the form of interaction between Tungsten plasma and foam column, a shadow imaging system of four-frame ultraviolet probe laser (266nm)has been designed on 1MA pulse power device. The time resolution of the system is 2.5ns, and static space resolution is superior to 70μm. The radial shadowgraphy image reveals the whole process from the melting and expansion of solid wire to the interaction of the precursor plasma and the foam, from the pinch to rebound inflation. The image shows the continuous interaction of Tungsten plasma and foam in a form of “Raining" within a time of about 50ns, the plasma shell structure has not been found in the whole period of pinch. The quantitative analysis indicates the minimum pinching speed of the foam column is 1.0×106cm/s, and maximum pinching speed is 6.0×106cm/s, and the axial stagnation diameter is approx 1mm.

Biotransformation of Artemisinin by using a Novel Soil Isolated Microorganism

Artemisinin is a potential antimalarial drug effective against the multidrug resistant forms of Malarial Parasites. The current production of artemisinin is insufficient to meet the global demand. In the present study microbial biotransformation of arteannuin B, a biogenetic precursor of artemisinin to the later has been investigated. Screening studies carried out on several soil borne microorganisms have yielded one novel species with the bioconversion ability. Crude cell free extract of 72h old culture of the isolate had shown the bioconversion activity. On incubation with the substrate arteannuin B, crude cell free extract of the isolate had shown a bioconversion of 18.54% to artemisinin on molar basis with a specific activity of 0.18 units/mg.

Obfuscation Studio Executive

New software protection product called “Obfuscation Studio" is presented in the paper. Several obfuscating modules that are already implemented are described. Some theoretical data is presented, that shows the potency and effectiveness of described obfuscation methods. “Obfuscation Studio" is being implemented for protecting programs written for .NET platform, but the described methods can also be interesting for other applications.

Implementing High Performance VPN Router using Cavium-s CN2560 Security Processor

IPsec protocol[1] is a set of security extensions developed by the IETF and it provides privacy and authentication services at the IP layer by using modern cryptography. In this paper, we describe both of H/W and S/W architectures of our router system, SRS-10. The system is designed to support high performance routing and IPsec VPN. Especially, we used Cavium-s CN2560 processor to implement IPsec processing in inline-mode.

Implicit Authorization Mechanism of Object-Oriented Database

Due to its special data structure and manipulative principle, Object-Oriented Database (OODB) has a particular security protection and authorization methods. This paper first introduces the features of security mechanism about OODB, and then talked about authorization checking process of OODB. Implicit authorization mechanism is based on the subject hierarchies, object hierarchies and access hierarchies of the security authorization modes, and simplifies the authorization mode. In addition, to combine with other authorization mechanisms, implicit authorization can make protection on the authorization of OODB expediently and effectively.

Unit Testing with Déjà-Vu Objects

In this paper we introduce a new unit test technique called déjà-vu object. Déjà-vu objects replace real objects used by classes under test, allowing the execution of isolated unit tests. A déjà-vu object is able to observe and record the behaviour of a real object during real sessions, and to replace it during unit tests, returning previously recorded results. Consequently déjà-vu object technique can be useful when a bottom-up development and testing strategy is adopted. In this case déjà-vu objects can increase test portability and test source code readability. At the same time they can reduce the time spent by programmers to develop test code and the risk of incompatibility during the switching between déjà-vu and production code.

Application of Neural Networks in Power Systems; A Review

The electric power industry is currently undergoing an unprecedented reform. One of the most exciting and potentially profitable recent developments is increasing usage of artificial intelligence techniques. The intention of this paper is to give an overview of using neural network (NN) techniques in power systems. According to the growth rate of NNs application in some power system subjects, this paper introduce a brief overview in fault diagnosis, security assessment, load forecasting, economic dispatch and harmonic analyzing. Advantages and disadvantages of using NNs in above mentioned subjects and the main challenges in these fields have been explained, too.

Investigation of Monochromatization Light Effect at Molecular/Atomic Level in Electronegative-Electropositive Gas Mixtures Plasma

In electronegative-electropositive gas mixtures plasma, at a total pressure varying in the range of ten to hundred Torr, the appearance of a quasi-mochromatization effect of the emitted radiation was reported. This radiation could be the result of the generating mechanisms at molecular level, which is the case of the excimer radiation but also at atomic level. Thus, in the last case, in (Ne+1%Ar/Xe+H2) gas mixtures plasma in a dielectric barrier discharge, this effect, called M-effect, consists in the reduction of the discharge emission spectrum practice at one single, strong spectral line with λ = 585.3 nm. The present paper is concerned with the characteristics comparative investigation of the principal reaction mechanisms involved in the quasi-monochromatization effect existence in the case of the excimer radiation, respectively of the Meffect. Also, the paper points out the role of the metastable electronegative atoms in the appearance of the monochromatization – effect at atomic level.

Combined DWT-CT Blind Digital Image Watermarking Algorithm

In this paper, we propose a new robust and secure system that is based on the combination between two different transforms Discrete wavelet Transform (DWT) and Contourlet Transform (CT). The combined transforms will compensate the drawback of using each transform separately. The proposed algorithm has been designed, implemented and tested successfully. The experimental results showed that selecting the best sub-band for embedding from both transforms will improve the imperceptibility and robustness of the new combined algorithm. The evaluated imperceptibility of the combined DWT-CT algorithm which gave a PSNR value 88.11 and the combination DWT-CT algorithm improves robustness since it produced better robust against Gaussian noise attack. In addition to that, the implemented system shored a successful extraction method to extract watermark efficiently.

The Effect of Risky Assets to Operating Efficiencies for Listed Securities Firms in Taiwan Using the Data Envelopment Analysis

This paper employs a the variable returns to scale DEA model to take account of risky assets and estimate the operating efficiencies for the 21 domestic listed securities firms during the period 2005-2009. Evidence is found that on average the brokerage securities firms- operating efficiencies are better than integrated securities firms. Evidence is also found that the technical inefficiency from inappropriate management constitutes the main source of the operating inefficiency for both types of securities firms. Moreover, the scale economies prevail in brokerage and integrated securities firms, in other words, which exhibit the characteristic of increasing returns to scale.

Making Ends Meet: The Challenges of Investing in and Accounting for Sustainability

The transition to sustainable development requires considerable investments from stakeholders, both financial and immaterial. However, accounting for such investments often poses a challenge, as ventures with intangible or non-financial returns remain oblivious to conventional accounting techniques and risk assessment. That such investments may significantly contribute to the welfare of those affected may act as a driving force behind attempting to bridge this gap. This gains crucial importance as investments must be also backed by governments and administrations; entities whose budget depends on taxpayers- contributions and whose tasks are based on securing the welfare of their citizens. Besides economic welfare, citizens also require social and environmental wellbeing too. However, administrations must also safeguard that welfare is guaranteed not only to present, but to future generations too. With already strained budgets and the requirement of sustainable development, governments on all levels face the double challenge of making both of these ends meet.

SimplexIS: Evaluating the Impact of e-Gov Simplification Measures in the Information System Architecure

Nowadays increasingly the population makes use of Information Technology (IT). As such, in recent year the Portuguese government increased its focus on using the IT for improving people-s life and began to develop a set of measures to enable the modernization of the Public Administration, and so reducing the gap between Public Administration and citizens.Thus the Portuguese Government launched the Simplex Program. However these SIMPLEX eGov measures, which have been implemented over the years, present a serious challenge: how to forecast its impact on existing Information Systems Architecture (ISA). Thus, this research is focus in addressing the problem of automating the evaluation of the actual impact of implementation an eGovSimplification and Modernization measures in the Information Systems Architecture. To realize the evaluation we proposes a Framework, which is supported by some key concepts as: Quality Factors, ISA modeling, Multicriteria Approach, Polarity Profile and Quality Metrics

Activation of Prophenoloxidase during Bacterial Injection into the Desert Locust, Schistocerca Gregaria

The present study has been conducted to characterize the prophenoloxidase (PPO) system of the desert locust, Schistocerca gregaria following injection of Bacillus thuringiensis kurstaki (Bt). The bulk of PPO system was associated with haemocytes and a little amount was found in plasma. This system was activated by different activators such as laminarin, lipopolysaccharide (LPS) and trypsin suggesting that the stimulatory mechanism may involve an enzyme cascade of one or more associated molecules. These activators did not activate all the molecules of the cascade. Presence of phenoloxidase activity (PO) coincides with the appearance of protein band with molecular weight (MW) 70.154 KD (Kilo Dalton).

Research on Software Security Testing

Software security testing is an important means to ensure software security and trustiness. This paper first mainly discusses the definition and classification of software security testing, and investigates methods and tools of software security testing widely. Then it analyzes and concludes the advantages and disadvantages of various methods and the scope of application, presents a taxonomy of security testing tools. Finally, the paper points out future focus and development directions of software security testing technology.

Addressing Data Security in the Cloud

The development of information and communication technology, the increased use of the internet, as well as the effects of the recession within the last years, have lead to the increased use of cloud computing based solutions, also called on-demand solutions. These solutions offer a large number of benefits to organizations as well as challenges and risks, mainly determined by data visualization in different geographic locations on the internet. As far as the specific risks of cloud environment are concerned, data security is still considered a peak barrier in adopting cloud computing. The present study offers an approach upon ensuring the security of cloud data, oriented towards the whole data life cycle. The final part of the study focuses on the assessment of data security in the cloud, this representing the bases in determining the potential losses and the premise for subsequent improvements and continuous learning.

Security Risk Analysis Based on the Policy Formalization and the Modeling of Big Systems

Security risk models have been successful in estimating the likelihood of attack for simple security threats. However, modeling complex system and their security risk is even a challenge. Many methods have been proposed to face this problem. Often difficult to manipulate, and not enough all-embracing they are not as famous as they should with administrators and deciders. We propose in this paper a new tool to model big systems on purpose. The software, takes into account attack threats and security strength.

Attacks and Counter Measures in BST Overlay Structure of Peer-To-Peer System

There are various overlay structures that provide efficient and scalable solutions for point and range query in a peer-topeer network. Overlay structure based on m-Binary Search Tree (BST) is one such popular technique. It deals with the division of the tree into different key intervals and then assigning the key intervals to a BST. The popularity of the BST makes this overlay structure vulnerable to different kinds of attacks. Here we present four such possible attacks namely index poisoning attack, eclipse attack, pollution attack and syn flooding attack. The functionality of BST is affected by these attacks. We also provide different security techniques that can be applied against these attacks.

Simulating the Dynamics of Distribution of Hazardous Substances Emitted by Motor Engines in a Residential Quarter

This article is dedicated to development of mathematical models for determining the dynamics of concentration of hazardous substances in urban turbulent atmosphere. Development of the mathematical models implied taking into account the time-space variability of the fields of meteorological items and such turbulent atmosphere data as vortex nature, nonlinear nature, dissipativity and diffusivity. Knowing the turbulent airflow velocity is not assumed when developing the model. However, a simplified model implies that the turbulent and molecular diffusion ratio is a piecewise constant function that changes depending on vertical distance from the earth surface. Thereby an important assumption of vertical stratification of urban air due to atmospheric accumulation of hazardous substances emitted by motor vehicles is introduced into the mathematical model. The suggested simplified non-linear mathematical model of determining the sought exhaust concentration at a priori unknown turbulent flow velocity through non-degenerate transformation is reduced to the model which is subsequently solved analytically.